Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment

Size: px
Start display at page:

Download "Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment"

Transcription

1 Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment Sébastien Rubrecht, Vincent Padois, Philippe Bidaud, Michel De Broissia To cite this version: Sébastien Rubrecht, Vincent Padois, Philippe Bidaud, Michel De Broissia. Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment. Jadran Lenarcic and Michael M. Stanisic. Advances in Robot Kinematics: Motion in Man and Machine Proceedings of the 12th International Symposium on Advances in Robot Kinematics, Springer, pp , 2010, < / _39>. <hal > HAL Id: hal Submitted on 15 Apr 2011 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

2 Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment S. Rubrecht, V. Padois, P. Bidaud and M. de Broissia Institut des Systèmes Intelligents et de Robotique, Paris, France, rubrecht@isir.upmc.fr 4 Bouygues Travaux Publics, Guyancourt, France Abstract. In this paper, we present an iterative kinematics control law for redundant manipulators overcoming some usual problems associated to cluttered environments (constraints violations, oscillations, environment dilatation). The Constraints Compliant Control approach relies on a passive avoidance scheme (no motion generation for constraints avoidance) on a limited number of constraints selected from a vicinity analysis. A scaling solution based on the feasible motions with respect to the constraints enables to reach the frontiers of the workspace. Two missions described as sequences of key frames are simulated to compare the performances of the Constraint Compliant Control with state of the art control laws. The obtained computation times remain acceptable to consider a use in real time. Key words: Redundancy resolution, Inverse velocity kinematics, Control. 1 Introduction Industrial robotics manipulator missions have evolved from well defined tasks in structured environments to missions where the tasks are more complex (involving multiple objectives among which various constraints) and where the environments are not always known in advance and can be harsh and cluttered. As an example, the motivations of the presented work consider the use of a teleoperated manipulator aimed at working in a tunnel boring machine cutter head (see Figure 1 and [1]). In such environments, the use of redundant manipulators enables to specify simultaneously various goals on different parts of the manipulator, explicitly or automatically. It gives the possibility to fulfill different tasks while strictly satisfying a certain amount of constraints (collision avoidance, joint position and velocity limits). However, to our knowledge, there is no multi-objective method that guarantees a safe behaviour whithout substantially reducing the motion capabilities, especially when the manipulator is expected to get close to the constraints surfaces (which may be operational surfaces). This is the problem tackled in this paper. Consider a manipulator with n DOFs and a set of objectives (not necessarily imposed to the same part of the manipulator) involving m operational displacements 1

3 2 S. Rubrecht, V. Padois, P. Bidaud and M. de Broissia Fig. 1 Tunnel Boring Machine: manipulator in the excavation room. δ x. The relation between the operational and the joints displacements (considered here as the actuators input signal, extension to torque controlled actuators is trivial) δx=jδq (1) where J is the jacobian associated to the objectives. In order to satisfy the constraints, usual avoidance strategies rely on an avoidance term δx C derived from a potential based on the inverse of the distance to the constraint [2]. This strategy is called active, as a motion is generated to avoid the constraint. Thus, the expected behaviour will result from the combination of the operational tasks ((J T,δx T ), concatenation of the tasks) and the constraints ((J C, δx C ), concatenation of the constraints). In the particular cases of joints related constraints (joint position and velocity limits), the constraint jacobian matrix is [0,...,0,±1,0,...,0], the ±1 rank being at the joint number in the manipulator chain, the sign depending on the limit type (maximum or minimum). These motions can be strictly prioritized in a multiobjective control law (see [4]) δq=j # 1δx 1 +(J 2 P J1 ) # (δx 2 J 2 J # 1δx 1 ) (2) where indexes 1 and 2 can be replaced by C and T and conversely. The # is a pseudoinversion operator (see [3]) and P J1 is a projector on the kernel of J 1 (details about inversions and projectors are exposed in section 3.1). Maciejewski [4] and Chaumette [5] proposed to put the constraints avoidance at the bottom of the task hierarchy (1 T, 2 C; referenced as control law A). It enables to striclty fulfill the tasks, but in case of conflict between the tasks and the constraints, the manipulator may violate the constraints. To avoid this, Sentis [6] puts the constraints at the top of the hierarchy (1 C, 2 T ; referenced as control law B). However, this choice has a bad impact on the reachability of the manipulator as the avoidance motions need activation thresholds, which results in oscillations on the functional parts of the manipulator. Moreover, as the constraints are not homogeneous (obstacle avoidance involves body lengths that depends on the obstacle position w.r.t. the robot, while joint limits do not), it is not possible to use a bounded potential. It implies a consequent size of the threshold, as the potential

4 Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment 3 should grow from zero to infinity along it, and also the possible presence of infinite terms in the control law. In order to avoid oscillations and infinite terms, Baerlocher uses in [7] an iterative approach based on an activation matrix that pre-multiplies the jacobian of the tasks. The algorithm deactivates the joints which violate their boundaries, so they are not included in the model inversion. However, this approach does not include other types of constraints and it often resorts to iterations in cases for which usual approaches find directly an admissible (i.e. constraints compliant) solution. This paper presents a framework that extends the approach of Baerlocher to the collisions avoidance and satisfies the joint velocity limits; in particular, when the environment is not overconstrained (number of DOF sufficient to track the tasks while complying to the constraints), the control law is equivalent to the classical control law A. A particular attention has been paid to keep the computation times in the range of the one obtained with control law A and B. In section 2, the Constraint Compliant Control (CCC), relying on the principle of passive avoidance, is introduced. Then, section 3 presents the simulations of two missions and the comparative results of the control laws presented previously (A, B and CCC). Finally, section 4 gathers the conclusions and the work perspectives. 2 Constraint Compliant Control This section exposes our contribution. First, the passive avoidance principle is developped, according to which the robot should not move to avoid static constraints. Then, the control law expression is exposed; finally, the whole algorithm is presented. 2.1 Passive Avoidance The approach of Baerlocher in [7] is equivalent to the insertion of a superior hierarchical level in which operational displacement would be null (δx C = 0). It has the advantage to satisfy the joint boundaries in all cases. The extension to every static constraints (static obstacles, joint position and velocity limits) is done using the following control law δq=j # C0+(J T P JC ) # (δx T J T J # C0)=(J T P JC ) # δx T (3) which ensures a strict compliance with any constraints in J C. This avoidance method is passive as no motion is generated by the proximity to a constraint. As what is described by the constraints expression is actually static in the physical world, no arbitrary motion is needed to satisfy them. Anyway, it is not often mandatory to forbid motions in all the constraints directions; it is not even desired, as it prevents

5 4 S. Rubrecht, V. Padois, P. Bidaud and M. de Broissia from getting closer to the constraints, but also from moving away from them. So, it is relevant to iterate on the constraints combinations to find the set of constraints that must be passively avoided to obtain an appropriate solution δ q, i.e. that minimizes the operational error while being admissible. Let J CC be a matrix containing a combination of lines of J C. The control law then becomes δq=(j T P JCC ) # δx T (4) Iterations are carried out to find the lines combination J CC which yields an appropriate δq. In particular, the admissibility test is performed using Eq. (7). 2.2 Active avoidance in additional objective The solutions admissibility can be increased by adding an extra term of active avoidance on the constraints that are not avoided passively: δq=(j T P JCC ) # δx T +(J }{{} CC P [ J ] CC ) # (δx CC J CC (J T P JC C) # δx T ) J Passive avoidance }{{} Active avoidance (5) where J CC is the complement of the lines of J CC in J C, δx CC is the desired operational avoidance displacement associated to J 1 CC and P [ J ] CC is the projector on the J kernel of the concatenation of J CC and J. The extra term tends to move the manipulator away from the constraints as long as the tasks are not impacted. In particular, when J c is empty, the control law behaves like control law A and a single iteration is needed when the situation is not overconstrained. The avoidance coefficients norm δx CC,i can be limited to avoid values tending to infinity. Finally, there are no oscillations on the functionnal part as the active avoidance term is under the task related term in the hierarchy. 2.3 Particular case of the joint velocity limit - Scaling The joint velocity limits should not be addressed with passive avoidance, as it would stop a joint to prevent it from going too fast. If a joint displacement is too high, the solution is scaled to reach the maximal admissible displacement. To keep the motion coherency, the scaling is done in a way that preserves the operational direction δq i,max δq δq min 0 i n δq i (6) 1 In a practical aspect, J CC (resp. δx CC ) can be replaced by J C (resp. δx C, desired operational avoidance displacement associated to J C ) in Eq. (5) without any consequence on the result.

6 Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment 5 where δq i,max is the maximum displacement of joint i on one iteration. This step is carried out only if a joint displacement δq i is higher than δq i,max. The test of admissibility with respect to the constraints is performed through J C δq l (7) where l is the concatenation of the maximum instantaneous displacements. In order to increase the validity of the solutions, the scaling is extended to all the solutions δq δq ( ) li min 0 i m (J C δq) i (8) (J C δq) i >0 The scaling is done only if Eq. (7) is not verified. This step enables to obtain an admissible solution for each constraints combination in J c. Actually, as all the constraints are in the form of Eq. (7), the solutions space is convex and contains the null solution (no motion). So, in every direction of the joint displacement space, there exists an admissible solution, which norm is null in the worst case. This method enables to get as close as possible to the constraints if there is a persistent demand in that way. The general algorithm of a control iteration is given by Algorithm 1. Algorithm 1 : CCC J C constraints under the active avoidance threshold δq comb 0 rad; δq 0 rad Err comb 0 m; Err 1 m; ε 10 2 m; for all Lines Combinations J CC in J C do δq comb Computation - Eq. (5) Admissibility Test - Eq. (7) Scaling - Eq. (8) Err comb Jδq δx T if Err comb Err then Err Err comb ; δq δq comb if Err ε then break end if end if end for send δq 3 Implementation and Comparative results This section presents the results of control laws A, B and CCC on two missions in the same environment. The proposed environment is composed of a column and a wall; the manipulator has 7 DOFs, all the links being 1 DOF rotational joints. The

7 6 S. Rubrecht, V. Padois, P. Bidaud and M. de Broissia environment and the manipulator are represented on Figure 2. The presented experi- Fig. 2 Views of the environment and the two trajectories to track; manipulator schemes. ments simulate two inspection missions involving trajectories close to the obstacles. For each mission, the manipulator must track a 3 coordinates trajectory: it is assumed that the effector (camera) has the orientation DOFs needed to observe the points to be inspected. For the sake of simplicity, the results presented here do not integrate joint boundaries avoidance even though the proposed framework can deal with this type of constraint without any specific difficulty. Mission 1: Go around the wall by the left side. The environment is barely constrained in that area, the manipulator tracks a trajectory (traj 1, in Figure 2) of 330 points on a single way of 3.50 m, so a displacement of 1.1 cm is expected for each iteration. The mission is feasible, i.e. the number of DOFs of the manipulator enables to fulfill the mission while avoiding the constraints. Mission 2: Reach a point behind the wall. The trajectory (traj 2, in Figure 2) has 560 points, for a go and come back trajectory (getting out of a very constrained configuration can be a problem). The total distance is 5.20 m long, so the expected displacement is 0.9 cm at each iteration. The mission is not feasible as the manipulator is not long enough to reach the furthest point. 3.1 Implementation The implementation is done in C++, and uses KDL (see [8]) and Boost::ublas 2 libraries. We detail the following implementation elements: Desired displacement δx T : difference between the current position and the current trajectory point /libs/numeric/ublas/doc/index.htm

8 Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment 7 Pseudoinversion: in the control law Eq. (5), in order to avoid inversion problems in the neighborhood of singularities, the pseudoinversions with exponent # are done using the Damped Least Square (DLS) method (see [9]), where the damping factor λ is chosen as A common way of computing P J is given by P J =(I J # J); in practice, the DLS method induces an error that distorts the projection, making the influence of lower priority objectives on upper priority objectives possible, which is not acceptable in our case. A safe way to compute P J can be obtained directly from the SVD of J which provides an access to the projector on the kernel of J without requiring its inversion (as mentionned in [10]). For the same reasons, a product (J a P Jb ) # is always pre-multiplicated by P Jb. Active avoidance : for control laws A and B, the active avoidance threshold is fixed to 15 cm, the gains are proportional (factor ) to the inverse of the distance to the constraint. For the CCC, the active avoidance is fixed to 4 cm, the gains are the same than for control laws A and B but the maximum value of the avoidance magnitude δx C is fixed to 0.25 (distance of 1 cm between the manipulator closest point and the obstacle). Distance computation : the distance computation is provided by the collision detection package SWIFT++ 3. The information given by SWIFT++ is, for each segment, the point of the segment that is the closest to the obstacle. The approach that consists in constraining only the closest point to the obstacle (based on [4] for the whole manipulator and on [11] for convex segments) is valid in continuous time. In discrete time, progressive displacements can violate constraints because of segment rotations. To our knowledge, no work has been carried out on that topic; a contribution of Kanehiro and al. in [12] deals with not strictly convex segments, in which the problems are similar to those encountered when getting from continuous to discrete time. To avoid the effects of this phenomenon, an envelope of 2 cm has been added around the environment. Joint instantaneous displacement limit : δq max has been fixed to 0.02 rad. 3.2 Results and Analysis Figures 3 and 4 present the results obtained on the 2 missions with control laws A, B and CCC. The computation times are given comparatively as they depend on the implementation and computing power. Mission 1: Go around the wall by the left side. Control law A. As the behavior is identical to the CCC on mission 1 (see 2.2), it is not represented on Figure 3. Control law B. The operational position mean error is 3.5 cm, the tracking is not optimal especially at the end where the effector gets close to the wall: oscillations are generated due to the thresholds (observable on both graphs) and the operational error grows up to 13.1 cm. 3

9 8 S. Rubrecht, V. Padois, P. Bidaud and M. de Broissia Fig. 3 Mission 1 results. Graphs of line 1 are obtained with control B, line 2 with control CCC Fig. 4 Mission 2 results. Graphs of line 1 are obtained with control A, line 2 with control B, line 3 with control CCC

10 Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment 9 Control law CCC. The behavior is identical to control law A: as there is no collisions when tracking the path with active avoidance at a lower level, the passive avoidance is not used and the manipulator has the same tracking error along the trajectory (operational position error inferior to 2.6 cm). Mission 2: Join a point behind the wall. Control law A. The operational position mean error is 3.8 cm and reaches 35 cm on peaks. When the situation gets overconstrained, collisions occur (the distances to the obstacle reach 0 for DOFS 4, 5 and 7) as it is not possible to satisfy tasks and constraints; the peaks on the operational positions comes from avoidance terms tending to infinity. Control law B. The oscillation phenomenon is higher than for mission 1 and the manipulator remains far from the path (operational position mean error 22.8 cm, max error 59.4 cm) Control law CCC. When the manipulator comes close to the environment (enveloppe distance: 2 cm), the passive avoidance clamps the directions to the obstacles (point A, B, C and D on the first column graph) and the concerned segments moves along the orthogonal directions. When the manipulator seems completely stuck (point E on the second column graph), the scaling step enables little displacements to track as much as possible the desired displacements. Finally, when the direction is inversed (point F on the 3rd column graph), the manipulator is able to get away from the constraints directly. The computation time grows up 6.7 times w.r.t. the ones obtained with control law A on mission 1. 4 Conclusion and Perspectives The CCC is an iterative control method that solves the hierarchical multi-objective control problem while satisfying any number of fixed constraints: obstacles, joint boundaries, joints velocity limits. The passive avoidance principle and the solutions scaling enables to overcome the drawbacks of active avoidance at the top (optimality loss, oscillations) or at the bottom (constraints violation, infinite terms) of the hierarchy, while ensuring a computation time low enough to consider its use in real time on classical manipulators. The CCC performances can be compared to the one obtained with convex optimization algorithms (even if the latter cannot ensure strict priorities between the hierarchy levels). As an example, the algorithm QuadProg++ 4 satisfies the constraints with a maximum computation time of 3 times the one of control law A. Nevertheless, the insufficiency of the avoidance method (see section 3.1) added to the algorithm trend to run along the constraints make the manipulator not able to get away of the most constrained configuration: it does not track the second part of the trajectory. 4

11 10 S. Rubrecht, V. Padois, P. Bidaud and M. de Broissia The work perspective includes: The continuity can be handled by including the limits of joint acceleration constraints but they introduce incompatibilities with obstacles and joint position limits; the use of virtual constraints (dampers) is under evaluation. Locally, the constraints combination choice can be guided by the constraints criticity or by favouring combinations retained for previous iterations, etc. In a more global scope, this choice can be adapted to the missions and it can depend on the parts of the robot: active avoidance for better motion capabilities, passive avoidance to work close to the constraints. Acknowledgements This work is a part of the TELEMACH project. It is supported by the French National Research Agency (ANR), Interactive Systems and Robotics Program 2007 (PSIROB07). References 1. Rubrecht, S. and Padois, V. and Bidaud, P.: Evolutionary Design of a Robotic Manipulator for a Highly Constrained Environment. In IEEE/RSJ International Conference on Intelligent Robots and Systems, Workshop on Exploring new horizons in Evolutionary Design of Robots. pp (2009) 2. Khatib, O.: Real-Time Obstacle Avoidance for Manipulators and Mobile Robots. The International Journal of Robotics Research. 5(1), pp (1986) 3. Ben Israel, A. and Greville, T.N.E.: Generalized Inverses: Theory and Applications. Springer (2nd edition) (2003) 4. Maciejewski, A. and Klein, C.: Obstacle avoidance for kinematically redundant manipulators in dynamically varying environments. The International Journal of Robotics Research. 4(3), pp (1985) 5. Chaumette, F. and Marchand, E.: A New Redundancy-based Iterative Scheme for Avoiding Joint Limits Application to visual servoing. In: IEEE International Conference on Robotics and Automation, 2, pp (2000) 6. Sentis, L. and Khatib, O.: Synthesis of whole-body behaviors through hierarchical control of behavioral primitives. The International Journal of Humanoid Robotics. 2(4), pp (2005) 7. Baerlocher, P. and Boulic, R.: An Inverse Kinematic Architecture Enforcing an Arbitrary Number of Strict Priority Levels. The Visual Computer: International Journal of Computer Graphics. 20(6), pp (2004) 8. Bruyninckx, H.: Open Robot Control Software: the OROCOS project. In: IEEE International Conference on Robotics and Automation, 3, pp (2001) 9. Nakamura, Y. and Hanafusa, H.: Inverse kinematics solutions with singularity robustness for robot manipulator control. Journal of Dynamic Systems, Measurement and Control. 108, pp (1986) 10. Salaun, C. and Padois, V. and Sigaud, O.: Control of Redundant Robots Using Learned Models: An Operational Space Control Approach. In: IEEE/RSJ International Conference on Intelligent Robots and Systems, pp (2009) 11. Faverjon, B. and Tournassoud, P.: A Local Based Approach for Path Planning of Manipulators With a High Number of Degrees of Freedom. In: IEEE International Conference on Robotics and Automation. 4, pp (1987) 12. Kanehiro, F. and Lamiraux, F. and Kanoun, O. and Yoshida, E. and Laumond, J-P.: A Local Collision Avoidance Method for Non-strictly Convex Polyhedra. In: Proceedings of Robotics: Science and Systems IV (2008).

Moveability and Collision Analysis for Fully-Parallel Manipulators

Moveability and Collision Analysis for Fully-Parallel Manipulators Moveability and Collision Analysis for Fully-Parallel Manipulators Damien Chablat, Philippe Wenger To cite this version: Damien Chablat, Philippe Wenger. Moveability and Collision Analysis for Fully-Parallel

More information

Real-time FEM based control of soft surgical robots

Real-time FEM based control of soft surgical robots Real-time FEM based control of soft surgical robots Frederick Largilliere, Eulalie Coevoet, Laurent Grisoni, Christian Duriez To cite this version: Frederick Largilliere, Eulalie Coevoet, Laurent Grisoni,

More information

Workspace and joint space analysis of the 3-RPS parallel robot

Workspace and joint space analysis of the 3-RPS parallel robot Workspace and joint space analysis of the 3-RPS parallel robot Damien Chablat, Ranjan Jha, Fabrice Rouillier, Guillaume Moroz To cite this version: Damien Chablat, Ranjan Jha, Fabrice Rouillier, Guillaume

More information

How to simulate a volume-controlled flooding with mathematical morphology operators?

How to simulate a volume-controlled flooding with mathematical morphology operators? How to simulate a volume-controlled flooding with mathematical morphology operators? Serge Beucher To cite this version: Serge Beucher. How to simulate a volume-controlled flooding with mathematical morphology

More information

Jane Li. Assistant Professor Mechanical Engineering Department, Robotic Engineering Program Worcester Polytechnic Institute

Jane Li. Assistant Professor Mechanical Engineering Department, Robotic Engineering Program Worcester Polytechnic Institute Jane Li Assistant Professor Mechanical Engineering Department, Robotic Engineering Program Worcester Polytechnic Institute (3 pts) Compare the testing methods for testing path segment and finding first

More information

Evolutionary Design of a Robotic Manipulator for a Highly Constrained Environment

Evolutionary Design of a Robotic Manipulator for a Highly Constrained Environment Evolutionary Design of a Robotic Manipulator for a Highly Constrained Environment Sébastien Rubrecht, Ekta Singla, Vincent Padois, Philippe Bidaud, Michel De Broissia To cite this version: Sébastien Rubrecht,

More information

Geometric and numerical aspects of redundancy

Geometric and numerical aspects of redundancy Geometric and numerical aspects of redundancy Pierre-Brice Wieber, Adrien Escande, Dimitar Dimitrov, Alexander Sherikov To cite this version: Pierre-Brice Wieber, Adrien Escande, Dimitar Dimitrov, Alexander

More information

HySCaS: Hybrid Stereoscopic Calibration Software

HySCaS: Hybrid Stereoscopic Calibration Software HySCaS: Hybrid Stereoscopic Calibration Software Guillaume Caron, Damien Eynard To cite this version: Guillaume Caron, Damien Eynard. HySCaS: Hybrid Stereoscopic Calibration Software. SPIE newsroom in

More information

Mokka, main guidelines and future

Mokka, main guidelines and future Mokka, main guidelines and future P. Mora De Freitas To cite this version: P. Mora De Freitas. Mokka, main guidelines and future. H. Videau; J-C. Brient. International Conference on Linear Collider, Apr

More information

Real-Time Collision Detection for Dynamic Virtual Environments

Real-Time Collision Detection for Dynamic Virtual Environments Real-Time Collision Detection for Dynamic Virtual Environments Gabriel Zachmann, Matthias Teschner, Stefan Kimmerle, Bruno Heidelberger, Laks Raghupathi, Arnulph Fuhrmann To cite this version: Gabriel

More information

ASAP.V2 and ASAP.V3: Sequential optimization of an Algorithm Selector and a Scheduler

ASAP.V2 and ASAP.V3: Sequential optimization of an Algorithm Selector and a Scheduler ASAP.V2 and ASAP.V3: Sequential optimization of an Algorithm Selector and a Scheduler François Gonard, Marc Schoenauer, Michele Sebag To cite this version: François Gonard, Marc Schoenauer, Michele Sebag.

More information

Comparator: A Tool for Quantifying Behavioural Compatibility

Comparator: A Tool for Quantifying Behavioural Compatibility Comparator: A Tool for Quantifying Behavioural Compatibility Meriem Ouederni, Gwen Salaün, Javier Cámara, Ernesto Pimentel To cite this version: Meriem Ouederni, Gwen Salaün, Javier Cámara, Ernesto Pimentel.

More information

A N-dimensional Stochastic Control Algorithm for Electricity Asset Management on PC cluster and Blue Gene Supercomputer

A N-dimensional Stochastic Control Algorithm for Electricity Asset Management on PC cluster and Blue Gene Supercomputer A N-dimensional Stochastic Control Algorithm for Electricity Asset Management on PC cluster and Blue Gene Supercomputer Stéphane Vialle, Xavier Warin, Patrick Mercier To cite this version: Stéphane Vialle,

More information

Intermediate Desired Value Approach for Continuous Transition among Multiple Tasks of Robots

Intermediate Desired Value Approach for Continuous Transition among Multiple Tasks of Robots 2 IEEE International Conference on Robotics and Automation Shanghai International Conference Center May 9-3, 2, Shanghai, China Intermediate Desired Value Approach for Continuous Transition among Multiple

More information

Lossless and Lossy Minimal Redundancy Pyramidal Decomposition for Scalable Image Compression Technique

Lossless and Lossy Minimal Redundancy Pyramidal Decomposition for Scalable Image Compression Technique Lossless and Lossy Minimal Redundancy Pyramidal Decomposition for Scalable Image Compression Technique Marie Babel, Olivier Déforges To cite this version: Marie Babel, Olivier Déforges. Lossless and Lossy

More information

Robust IP and UDP-lite header recovery for packetized multimedia transmission

Robust IP and UDP-lite header recovery for packetized multimedia transmission Robust IP and UDP-lite header recovery for packetized multimedia transmission Michel Kieffer, François Mériaux To cite this version: Michel Kieffer, François Mériaux. Robust IP and UDP-lite header recovery

More information

BoxPlot++ Zeina Azmeh, Fady Hamoui, Marianne Huchard. To cite this version: HAL Id: lirmm

BoxPlot++ Zeina Azmeh, Fady Hamoui, Marianne Huchard. To cite this version: HAL Id: lirmm BoxPlot++ Zeina Azmeh, Fady Hamoui, Marianne Huchard To cite this version: Zeina Azmeh, Fady Hamoui, Marianne Huchard. BoxPlot++. RR-11001, 2011. HAL Id: lirmm-00557222 https://hal-lirmm.ccsd.cnrs.fr/lirmm-00557222

More information

Service Reconfiguration in the DANAH Assistive System

Service Reconfiguration in the DANAH Assistive System Service Reconfiguration in the DANAH Assistive System Said Lankri, Pascal Berruet, Jean-Luc Philippe To cite this version: Said Lankri, Pascal Berruet, Jean-Luc Philippe. Service Reconfiguration in the

More information

SDLS: a Matlab package for solving conic least-squares problems

SDLS: a Matlab package for solving conic least-squares problems SDLS: a Matlab package for solving conic least-squares problems Didier Henrion, Jérôme Malick To cite this version: Didier Henrion, Jérôme Malick. SDLS: a Matlab package for solving conic least-squares

More information

lambda-min Decoding Algorithm of Regular and Irregular LDPC Codes

lambda-min Decoding Algorithm of Regular and Irregular LDPC Codes lambda-min Decoding Algorithm of Regular and Irregular LDPC Codes Emmanuel Boutillon, Frédéric Guillou, Jean-Luc Danger To cite this version: Emmanuel Boutillon, Frédéric Guillou, Jean-Luc Danger lambda-min

More information

Efficient Gradient Method for Locally Optimizing the Periodic/Aperiodic Ambiguity Function

Efficient Gradient Method for Locally Optimizing the Periodic/Aperiodic Ambiguity Function Efficient Gradient Method for Locally Optimizing the Periodic/Aperiodic Ambiguity Function F Arlery, R assab, U Tan, F Lehmann To cite this version: F Arlery, R assab, U Tan, F Lehmann. Efficient Gradient

More information

Comparison of radiosity and ray-tracing methods for coupled rooms

Comparison of radiosity and ray-tracing methods for coupled rooms Comparison of radiosity and ray-tracing methods for coupled rooms Jimmy Dondaine, Alain Le Bot, Joel Rech, Sébastien Mussa Peretto To cite this version: Jimmy Dondaine, Alain Le Bot, Joel Rech, Sébastien

More information

Setup of epiphytic assistance systems with SEPIA

Setup of epiphytic assistance systems with SEPIA Setup of epiphytic assistance systems with SEPIA Blandine Ginon, Stéphanie Jean-Daubias, Pierre-Antoine Champin, Marie Lefevre To cite this version: Blandine Ginon, Stéphanie Jean-Daubias, Pierre-Antoine

More information

Simulations of VANET Scenarios with OPNET and SUMO

Simulations of VANET Scenarios with OPNET and SUMO Simulations of VANET Scenarios with OPNET and SUMO Florent Kaisser, Christophe Gransart, Marion Berbineau To cite this version: Florent Kaisser, Christophe Gransart, Marion Berbineau. Simulations of VANET

More information

QuickRanking: Fast Algorithm For Sorting And Ranking Data

QuickRanking: Fast Algorithm For Sorting And Ranking Data QuickRanking: Fast Algorithm For Sorting And Ranking Data Laurent Ott To cite this version: Laurent Ott. QuickRanking: Fast Algorithm For Sorting And Ranking Data. Fichiers produits par l auteur. 2015.

More information

THE KINEMATIC AND INERTIAL SOIL-PILE INTERACTIONS: CENTRIFUGE MODELLING

THE KINEMATIC AND INERTIAL SOIL-PILE INTERACTIONS: CENTRIFUGE MODELLING THE KINEMATIC AND INERTIAL SOIL-PILE INTERACTIONS: CENTRIFUGE MODELLING Nawel Chenaf, Jean-Louis Chazelas To cite this version: Nawel Chenaf, Jean-Louis Chazelas. THE KINEMATIC AND INERTIAL SOIL-PILE INTER-

More information

Prioritizing linear equality and inequality systems: application to local motion planning for redundant. robots

Prioritizing linear equality and inequality systems: application to local motion planning for redundant. robots Prioritizing linear equality and inequality systems: application to local motion planning for redundant robots Oussama Kanoun, Florent Lamiraux, Pierre-Brice Wieber, Fumio Kanehiro, Eiichi Yoshida, Jean-Paul

More information

A local planner for closed-loop robot

A local planner for closed-loop robot A local planner for closed-loop robot Jean-Pierre Merlet To cite this version: Jean-Pierre Merlet. A local planner for closed-loop robot. IEEE ICRA, Apr 007, Rome, 007. HAL Id: inria-0009336

More information

Modularity for Java and How OSGi Can Help

Modularity for Java and How OSGi Can Help Modularity for Java and How OSGi Can Help Richard Hall To cite this version: Richard Hall. Modularity for Java and How OSGi Can Help. présentation invitée à DECOR04. 2004. HAL Id: hal-00003299

More information

Kinematic analysis of planar tensegrity 2-X manipulators

Kinematic analysis of planar tensegrity 2-X manipulators Kinematic analysis of planar tensegrity -X manipulators Matthieu Furet, Max Lettl, Philippe Wenger To cite this version: Matthieu Furet, Max Lettl, Philippe Wenger. Kinematic analysis of planar tensegrity

More information

Linked data from your pocket: The Android RDFContentProvider

Linked data from your pocket: The Android RDFContentProvider Linked data from your pocket: The Android RDFContentProvider Jérôme David, Jérôme Euzenat To cite this version: Jérôme David, Jérôme Euzenat. Linked data from your pocket: The Android RDFContentProvider.

More information

Assisted Policy Management for SPARQL Endpoints Access Control

Assisted Policy Management for SPARQL Endpoints Access Control Assisted Policy Management for SPARQL Endpoints Access Control Luca Costabello, Serena Villata, Iacopo Vagliano, Fabien Gandon To cite this version: Luca Costabello, Serena Villata, Iacopo Vagliano, Fabien

More information

Computing and maximizing the exact reliability of wireless backhaul networks

Computing and maximizing the exact reliability of wireless backhaul networks Computing and maximizing the exact reliability of wireless backhaul networks David Coudert, James Luedtke, Eduardo Moreno, Konstantinos Priftis To cite this version: David Coudert, James Luedtke, Eduardo

More information

Tacked Link List - An Improved Linked List for Advance Resource Reservation

Tacked Link List - An Improved Linked List for Advance Resource Reservation Tacked Link List - An Improved Linked List for Advance Resource Reservation Li-Bing Wu, Jing Fan, Lei Nie, Bing-Yi Liu To cite this version: Li-Bing Wu, Jing Fan, Lei Nie, Bing-Yi Liu. Tacked Link List

More information

An Efficient Numerical Inverse Scattering Algorithm for Generalized Zakharov-Shabat Equations with Two Potential Functions

An Efficient Numerical Inverse Scattering Algorithm for Generalized Zakharov-Shabat Equations with Two Potential Functions An Efficient Numerical Inverse Scattering Algorithm for Generalized Zakharov-Shabat Equations with Two Potential Functions Huaibin Tang, Qinghua Zhang To cite this version: Huaibin Tang, Qinghua Zhang.

More information

THE COVERING OF ANCHORED RECTANGLES UP TO FIVE POINTS

THE COVERING OF ANCHORED RECTANGLES UP TO FIVE POINTS THE COVERING OF ANCHORED RECTANGLES UP TO FIVE POINTS Antoine Mhanna To cite this version: Antoine Mhanna. THE COVERING OF ANCHORED RECTANGLES UP TO FIVE POINTS. 016. HAL Id: hal-0158188

More information

Representation of Finite Games as Network Congestion Games

Representation of Finite Games as Network Congestion Games Representation of Finite Games as Network Congestion Games Igal Milchtaich To cite this version: Igal Milchtaich. Representation of Finite Games as Network Congestion Games. Roberto Cominetti and Sylvain

More information

Regularization parameter estimation for non-negative hyperspectral image deconvolution:supplementary material

Regularization parameter estimation for non-negative hyperspectral image deconvolution:supplementary material Regularization parameter estimation for non-negative hyperspectral image deconvolution:supplementary material Yingying Song, David Brie, El-Hadi Djermoune, Simon Henrot To cite this version: Yingying Song,

More information

NP versus PSPACE. Frank Vega. To cite this version: HAL Id: hal https://hal.archives-ouvertes.fr/hal

NP versus PSPACE. Frank Vega. To cite this version: HAL Id: hal https://hal.archives-ouvertes.fr/hal NP versus PSPACE Frank Vega To cite this version: Frank Vega. NP versus PSPACE. Preprint submitted to Theoretical Computer Science 2015. 2015. HAL Id: hal-01196489 https://hal.archives-ouvertes.fr/hal-01196489

More information

Blind Browsing on Hand-Held Devices: Touching the Web... to Understand it Better

Blind Browsing on Hand-Held Devices: Touching the Web... to Understand it Better Blind Browsing on Hand-Held Devices: Touching the Web... to Understand it Better Waseem Safi Fabrice Maurel Jean-Marc Routoure Pierre Beust Gaël Dias To cite this version: Waseem Safi Fabrice Maurel Jean-Marc

More information

1498. End-effector vibrations reduction in trajectory tracking for mobile manipulator

1498. End-effector vibrations reduction in trajectory tracking for mobile manipulator 1498. End-effector vibrations reduction in trajectory tracking for mobile manipulator G. Pajak University of Zielona Gora, Faculty of Mechanical Engineering, Zielona Góra, Poland E-mail: g.pajak@iizp.uz.zgora.pl

More information

Efficient implementation of interval matrix multiplication

Efficient implementation of interval matrix multiplication Efficient implementation of interval matrix multiplication Hong Diep Nguyen To cite this version: Hong Diep Nguyen. Efficient implementation of interval matrix multiplication. Para 2010: State of the Art

More information

Continuous Control of Lagrangian Data

Continuous Control of Lagrangian Data Continuous Control of Lagrangian Data Pierre Allain, Nicolas Courty, Thomas Corpetti To cite this version: Pierre Allain, Nicolas Courty, Thomas Corpetti. Continuous Control of Lagrangian Data. 3rd International

More information

1724. Mobile manipulators collision-free trajectory planning with regard to end-effector vibrations elimination

1724. Mobile manipulators collision-free trajectory planning with regard to end-effector vibrations elimination 1724. Mobile manipulators collision-free trajectory planning with regard to end-effector vibrations elimination Iwona Pajak 1, Grzegorz Pajak 2 University of Zielona Gora, Faculty of Mechanical Engineering,

More information

KeyGlasses : Semi-transparent keys to optimize text input on virtual keyboard

KeyGlasses : Semi-transparent keys to optimize text input on virtual keyboard KeyGlasses : Semi-transparent keys to optimize text input on virtual keyboard Mathieu Raynal, Nadine Vigouroux To cite this version: Mathieu Raynal, Nadine Vigouroux. KeyGlasses : Semi-transparent keys

More information

Kinematics Analysis of Free-Floating Redundant Space Manipulator based on Momentum Conservation. Germany, ,

Kinematics Analysis of Free-Floating Redundant Space Manipulator based on Momentum Conservation. Germany, , Kinematics Analysis of Free-Floating Redundant Space Manipulator based on Momentum Conservation Mingming Wang (1) (1) Institute of Astronautics, TU Muenchen, Boltzmannstr. 15, D-85748, Garching, Germany,

More information

The Proportional Colouring Problem: Optimizing Buffers in Radio Mesh Networks

The Proportional Colouring Problem: Optimizing Buffers in Radio Mesh Networks The Proportional Colouring Problem: Optimizing Buffers in Radio Mesh Networks Florian Huc, Claudia Linhares Sales, Hervé Rivano To cite this version: Florian Huc, Claudia Linhares Sales, Hervé Rivano.

More information

Reverse-engineering of UML 2.0 Sequence Diagrams from Execution Traces

Reverse-engineering of UML 2.0 Sequence Diagrams from Execution Traces Reverse-engineering of UML 2.0 Sequence Diagrams from Execution Traces Romain Delamare, Benoit Baudry, Yves Le Traon To cite this version: Romain Delamare, Benoit Baudry, Yves Le Traon. Reverse-engineering

More information

Change Detection System for the Maintenance of Automated Testing

Change Detection System for the Maintenance of Automated Testing Change Detection System for the Maintenance of Automated Testing Miroslav Bures To cite this version: Miroslav Bures. Change Detection System for the Maintenance of Automated Testing. Mercedes G. Merayo;

More information

Fault-Tolerant Storage Servers for the Databases of Redundant Web Servers in a Computing Grid

Fault-Tolerant Storage Servers for the Databases of Redundant Web Servers in a Computing Grid Fault-Tolerant s for the Databases of Redundant Web Servers in a Computing Grid Minhwan Ok To cite this version: Minhwan Ok. Fault-Tolerant s for the Databases of Redundant Web Servers in a Computing Grid.

More information

DANCer: Dynamic Attributed Network with Community Structure Generator

DANCer: Dynamic Attributed Network with Community Structure Generator DANCer: Dynamic Attributed Network with Community Structure Generator Oualid Benyahia, Christine Largeron, Baptiste Jeudy, Osmar Zaïane To cite this version: Oualid Benyahia, Christine Largeron, Baptiste

More information

A Methodology for Improving Software Design Lifecycle in Embedded Control Systems

A Methodology for Improving Software Design Lifecycle in Embedded Control Systems A Methodology for Improving Software Design Lifecycle in Embedded Control Systems Mohamed El Mongi Ben Gaïd, Rémy Kocik, Yves Sorel, Rédha Hamouche To cite this version: Mohamed El Mongi Ben Gaïd, Rémy

More information

Open Digital Forms. Hiep Le, Thomas Rebele, Fabian Suchanek. HAL Id: hal

Open Digital Forms. Hiep Le, Thomas Rebele, Fabian Suchanek. HAL Id: hal Open Digital Forms Hiep Le, Thomas Rebele, Fabian Suchanek To cite this version: Hiep Le, Thomas Rebele, Fabian Suchanek. Open Digital Forms. Research and Advanced Technology for Digital Libraries - 20th

More information

The optimal routing of augmented cubes.

The optimal routing of augmented cubes. The optimal routing of augmented cubes. Meirun Chen, Reza Naserasr To cite this version: Meirun Chen, Reza Naserasr. The optimal routing of augmented cubes.. Information Processing Letters, Elsevier, 28.

More information

Taking Benefit from the User Density in Large Cities for Delivering SMS

Taking Benefit from the User Density in Large Cities for Delivering SMS Taking Benefit from the User Density in Large Cities for Delivering SMS Yannick Léo, Anthony Busson, Carlos Sarraute, Eric Fleury To cite this version: Yannick Léo, Anthony Busson, Carlos Sarraute, Eric

More information

Comparison of spatial indexes

Comparison of spatial indexes Comparison of spatial indexes Nathalie Andrea Barbosa Roa To cite this version: Nathalie Andrea Barbosa Roa. Comparison of spatial indexes. [Research Report] Rapport LAAS n 16631,., 13p. HAL

More information

An Experimental Assessment of the 2D Visibility Complex

An Experimental Assessment of the 2D Visibility Complex An Experimental Assessment of the D Visibility Complex Hazel Everett, Sylvain Lazard, Sylvain Petitjean, Linqiao Zhang To cite this version: Hazel Everett, Sylvain Lazard, Sylvain Petitjean, Linqiao Zhang.

More information

Very Tight Coupling between LTE and WiFi: a Practical Analysis

Very Tight Coupling between LTE and WiFi: a Practical Analysis Very Tight Coupling between LTE and WiFi: a Practical Analysis Younes Khadraoui, Xavier Lagrange, Annie Gravey To cite this version: Younes Khadraoui, Xavier Lagrange, Annie Gravey. Very Tight Coupling

More information

Kinematic Control Algorithms for On-Line Obstacle Avoidance for Redundant Manipulators

Kinematic Control Algorithms for On-Line Obstacle Avoidance for Redundant Manipulators Kinematic Control Algorithms for On-Line Obstacle Avoidance for Redundant Manipulators Leon Žlajpah and Bojan Nemec Institute Jožef Stefan, Ljubljana, Slovenia, leon.zlajpah@ijs.si Abstract The paper deals

More information

The Connectivity Order of Links

The Connectivity Order of Links The Connectivity Order of Links Stéphane Dugowson To cite this version: Stéphane Dugowson. The Connectivity Order of Links. 4 pages, 2 figures. 2008. HAL Id: hal-00275717 https://hal.archives-ouvertes.fr/hal-00275717

More information

ROBUST MOTION SEGMENTATION FOR HIGH DEFINITION VIDEO SEQUENCES USING A FAST MULTI-RESOLUTION MOTION ESTIMATION BASED ON SPATIO-TEMPORAL TUBES

ROBUST MOTION SEGMENTATION FOR HIGH DEFINITION VIDEO SEQUENCES USING A FAST MULTI-RESOLUTION MOTION ESTIMATION BASED ON SPATIO-TEMPORAL TUBES ROBUST MOTION SEGMENTATION FOR HIGH DEFINITION VIDEO SEQUENCES USING A FAST MULTI-RESOLUTION MOTION ESTIMATION BASED ON SPATIO-TEMPORAL TUBES Olivier Brouard, Fabrice Delannay, Vincent Ricordel, Dominique

More information

Branch-and-price algorithms for the Bi-Objective Vehicle Routing Problem with Time Windows

Branch-and-price algorithms for the Bi-Objective Vehicle Routing Problem with Time Windows Branch-and-price algorithms for the Bi-Objective Vehicle Routing Problem with Time Windows Estèle Glize, Nicolas Jozefowiez, Sandra Ulrich Ngueveu To cite this version: Estèle Glize, Nicolas Jozefowiez,

More information

Learning a Representation of a Believable Virtual Character s Environment with an Imitation Algorithm

Learning a Representation of a Believable Virtual Character s Environment with an Imitation Algorithm Learning a Representation of a Believable Virtual Character s Environment with an Imitation Algorithm Fabien Tencé, Cédric Buche, Pierre De Loor, Olivier Marc To cite this version: Fabien Tencé, Cédric

More information

Compromise Based Evolutionary Multiobjective Optimization Algorithm for Multidisciplinary Optimization

Compromise Based Evolutionary Multiobjective Optimization Algorithm for Multidisciplinary Optimization Compromise Based Evolutionary Multiobjective Optimization Algorithm for Multidisciplinary Optimization Benoît Guédas, Xavier Gandibleux, Philippe Dépincé To cite this version: Benoît Guédas, Xavier Gandibleux,

More information

Relabeling nodes according to the structure of the graph

Relabeling nodes according to the structure of the graph Relabeling nodes according to the structure of the graph Ronan Hamon, Céline Robardet, Pierre Borgnat, Patrick Flandrin To cite this version: Ronan Hamon, Céline Robardet, Pierre Borgnat, Patrick Flandrin.

More information

Multimedia CTI Services for Telecommunication Systems

Multimedia CTI Services for Telecommunication Systems Multimedia CTI Services for Telecommunication Systems Xavier Scharff, Pascal Lorenz, Zoubir Mammeri To cite this version: Xavier Scharff, Pascal Lorenz, Zoubir Mammeri. Multimedia CTI Services for Telecommunication

More information

Malware models for network and service management

Malware models for network and service management Malware models for network and service management Jérôme François, Radu State, Olivier Festor To cite this version: Jérôme François, Radu State, Olivier Festor. Malware models for network and service management.

More information

Natural Language Based User Interface for On-Demand Service Composition

Natural Language Based User Interface for On-Demand Service Composition Natural Language Based User Interface for On-Demand Service Composition Marcel Cremene, Florin-Claudiu Pop, Stéphane Lavirotte, Jean-Yves Tigli To cite this version: Marcel Cremene, Florin-Claudiu Pop,

More information

Formal modelling of ontologies within Event-B

Formal modelling of ontologies within Event-B Formal modelling of ontologies within Event-B Yamine Ait Ameur, Idir Ait-Sadoune, Kahina Hacid, Linda Mohand Oussaid To cite this version: Yamine Ait Ameur, Idir Ait-Sadoune, Kahina Hacid, Linda Mohand

More information

Scalewelis: a Scalable Query-based Faceted Search System on Top of SPARQL Endpoints

Scalewelis: a Scalable Query-based Faceted Search System on Top of SPARQL Endpoints Scalewelis: a Scalable Query-based Faceted Search System on Top of SPARQL Endpoints Joris Guyonvarc H, Sébastien Ferré To cite this version: Joris Guyonvarc H, Sébastien Ferré. Scalewelis: a Scalable Query-based

More information

Synthesis of fixed-point programs: the case of matrix multiplication

Synthesis of fixed-point programs: the case of matrix multiplication Synthesis of fixed-point programs: the case of matrix multiplication Mohamed Amine Najahi To cite this version: Mohamed Amine Najahi. Synthesis of fixed-point programs: the case of matrix multiplication.

More information

Research Subject. Dynamics Computation and Behavior Capture of Human Figures (Nakamura Group)

Research Subject. Dynamics Computation and Behavior Capture of Human Figures (Nakamura Group) Research Subject Dynamics Computation and Behavior Capture of Human Figures (Nakamura Group) (1) Goal and summary Introduction Humanoid has less actuators than its movable degrees of freedom (DOF) which

More information

Primitive roots of bi-periodic infinite pictures

Primitive roots of bi-periodic infinite pictures Primitive roots of bi-periodic infinite pictures Nicolas Bacquey To cite this version: Nicolas Bacquey. Primitive roots of bi-periodic infinite pictures. Words 5, Sep 5, Kiel, Germany. Words 5, Local Proceedings.

More information

Changing Assembly Modes without Passing Parallel Singularities in Non-Cuspidal 3-RPR Planar Parallel Robots

Changing Assembly Modes without Passing Parallel Singularities in Non-Cuspidal 3-RPR Planar Parallel Robots Changing Assembly Modes without Passing Parallel Singularities in Non-Cuspidal 3-RPR Planar Parallel Robots Ilian Bonev, Sébastien Briot, Philippe Wenger, Damien Chablat To cite this version: Ilian Bonev,

More information

Using a Medical Thesaurus to Predict Query Difficulty

Using a Medical Thesaurus to Predict Query Difficulty Using a Medical Thesaurus to Predict Query Difficulty Florian Boudin, Jian-Yun Nie, Martin Dawes To cite this version: Florian Boudin, Jian-Yun Nie, Martin Dawes. Using a Medical Thesaurus to Predict Query

More information

Fast and precise kinematic skeleton extraction of 3D dynamic meshes

Fast and precise kinematic skeleton extraction of 3D dynamic meshes Fast and precise kinematic skeleton extraction of 3D dynamic meshes Julien Tierny, Jean-Philippe Vandeborre, Mohamed Daoudi To cite this version: Julien Tierny, Jean-Philippe Vandeborre, Mohamed Daoudi.

More information

Captured Motion Data Processing for Real Time Synthesis of Sign Language

Captured Motion Data Processing for Real Time Synthesis of Sign Language Captured Motion Data Processing for Real Time Synthesis of Sign Language Alexis Héloir, Sylvie Gibet, Franck Multon, Nicolas Courty To cite this version: Alexis Héloir, Sylvie Gibet, Franck Multon, Nicolas

More information

Spectral Active Clustering of Remote Sensing Images

Spectral Active Clustering of Remote Sensing Images Spectral Active Clustering of Remote Sensing Images Zifeng Wang, Gui-Song Xia, Caiming Xiong, Liangpei Zhang To cite this version: Zifeng Wang, Gui-Song Xia, Caiming Xiong, Liangpei Zhang. Spectral Active

More information

Fuzzy sensor for the perception of colour

Fuzzy sensor for the perception of colour Fuzzy sensor for the perception of colour Eric Benoit, Laurent Foulloy, Sylvie Galichet, Gilles Mauris To cite this version: Eric Benoit, Laurent Foulloy, Sylvie Galichet, Gilles Mauris. Fuzzy sensor for

More information

Quasi-tilings. Dominique Rossin, Daniel Krob, Sebastien Desreux

Quasi-tilings. Dominique Rossin, Daniel Krob, Sebastien Desreux Quasi-tilings Dominique Rossin, Daniel Krob, Sebastien Desreux To cite this version: Dominique Rossin, Daniel Krob, Sebastien Desreux. Quasi-tilings. FPSAC/SFCA 03, 2003, Linkoping, Sweden. 2003.

More information

Study on Feebly Open Set with Respect to an Ideal Topological Spaces

Study on Feebly Open Set with Respect to an Ideal Topological Spaces Study on Feebly Open Set with Respect to an Ideal Topological Spaces Yiezi K. Al Talkany, Suadud H. Al Ismael To cite this version: Yiezi K. Al Talkany, Suadud H. Al Ismael. Study on Feebly Open Set with

More information

An FCA Framework for Knowledge Discovery in SPARQL Query Answers

An FCA Framework for Knowledge Discovery in SPARQL Query Answers An FCA Framework for Knowledge Discovery in SPARQL Query Answers Melisachew Wudage Chekol, Amedeo Napoli To cite this version: Melisachew Wudage Chekol, Amedeo Napoli. An FCA Framework for Knowledge Discovery

More information

A Practical Approach for 3D Model Indexing by combining Local and Global Invariants

A Practical Approach for 3D Model Indexing by combining Local and Global Invariants A Practical Approach for 3D Model Indexing by combining Local and Global Invariants Jean-Philippe Vandeborre, Vincent Couillet, Mohamed Daoudi To cite this version: Jean-Philippe Vandeborre, Vincent Couillet,

More information

Acyclic Coloring of Graphs of Maximum Degree

Acyclic Coloring of Graphs of Maximum Degree Acyclic Coloring of Graphs of Maximum Degree Guillaume Fertin, André Raspaud To cite this version: Guillaume Fertin, André Raspaud. Acyclic Coloring of Graphs of Maximum Degree. Stefan Felsner. 005 European

More information

DSM GENERATION FROM STEREOSCOPIC IMAGERY FOR DAMAGE MAPPING, APPLICATION ON THE TOHOKU TSUNAMI

DSM GENERATION FROM STEREOSCOPIC IMAGERY FOR DAMAGE MAPPING, APPLICATION ON THE TOHOKU TSUNAMI DSM GENERATION FROM STEREOSCOPIC IMAGERY FOR DAMAGE MAPPING, APPLICATION ON THE TOHOKU TSUNAMI Cyrielle Guérin, Renaud Binet, Marc Pierrot-Deseilligny To cite this version: Cyrielle Guérin, Renaud Binet,

More information

Teaching Encapsulation and Modularity in Object-Oriented Languages with Access Graphs

Teaching Encapsulation and Modularity in Object-Oriented Languages with Access Graphs Teaching Encapsulation and Modularity in Object-Oriented Languages with Access Graphs Gilles Ardourel, Marianne Huchard To cite this version: Gilles Ardourel, Marianne Huchard. Teaching Encapsulation and

More information

MUTE: A Peer-to-Peer Web-based Real-time Collaborative Editor

MUTE: A Peer-to-Peer Web-based Real-time Collaborative Editor MUTE: A Peer-to-Peer Web-based Real-time Collaborative Editor Matthieu Nicolas, Victorien Elvinger, Gérald Oster, Claudia-Lavinia Ignat, François Charoy To cite this version: Matthieu Nicolas, Victorien

More information

SIM-Mee - Mobilizing your social network

SIM-Mee - Mobilizing your social network SIM-Mee - Mobilizing your social network Jérémie Albert, Serge Chaumette, Damien Dubernet, Jonathan Ouoba To cite this version: Jérémie Albert, Serge Chaumette, Damien Dubernet, Jonathan Ouoba. SIM-Mee

More information

Lecture «Robot Dynamics»: Kinematic Control

Lecture «Robot Dynamics»: Kinematic Control Lecture «Robot Dynamics»: Kinematic Control 151-0851-00 V lecture: CAB G11 Tuesday 10:15 12:00, every week exercise: HG E1.2 Wednesday 8:15 10:00, according to schedule (about every 2nd week) Marco Hutter,

More information

Scale Invariant Detection and Tracking of Elongated Structures

Scale Invariant Detection and Tracking of Elongated Structures Scale Invariant Detection and Tracking of Elongated Structures Amaury Nègre, James L. Crowley, Christian Laugier To cite this version: Amaury Nègre, James L. Crowley, Christian Laugier. Scale Invariant

More information

Implementing an Automatic Functional Test Pattern Generation for Mixed-Signal Boards in a Maintenance Context

Implementing an Automatic Functional Test Pattern Generation for Mixed-Signal Boards in a Maintenance Context Implementing an Automatic Functional Test Pattern Generation for Mixed-Signal Boards in a Maintenance Context Bertrand Gilles, Laurent Tchamnda Nana, Valérie-Anne Nicolas To cite this version: Bertrand

More information

Multi-atlas labeling with population-specific template and non-local patch-based label fusion

Multi-atlas labeling with population-specific template and non-local patch-based label fusion Multi-atlas labeling with population-specific template and non-local patch-based label fusion Vladimir Fonov, Pierrick Coupé, Simon Eskildsen, Jose Manjon, Louis Collins To cite this version: Vladimir

More information

Linux: Understanding Process-Level Power Consumption

Linux: Understanding Process-Level Power Consumption Linux: Understanding Process-Level Power Consumption Aurélien Bourdon, Adel Noureddine, Romain Rouvoy, Lionel Seinturier To cite this version: Aurélien Bourdon, Adel Noureddine, Romain Rouvoy, Lionel Seinturier.

More information

OA-DVFA: A Distributed Virtual Forces-based Algorithm to Monitor an Area with Unknown Obstacles

OA-DVFA: A Distributed Virtual Forces-based Algorithm to Monitor an Area with Unknown Obstacles OA-DVFA: A Distributed Virtual Forces-based Algorithm to Monitor an Area with Unknown Obstacles Ines Khoufi, Pascale Minet, Anis Laouiti To cite this version: Ines Khoufi, Pascale Minet, Anis Laouiti.

More information

Preliminary analysis of the drive system of the CTA LST Telescope and its integration in the whole PLC architecture

Preliminary analysis of the drive system of the CTA LST Telescope and its integration in the whole PLC architecture drive system of the CTA LST the whole PLC architecture I. Monteiro, L. Brunetti, T. Le Flour, G. Lamanna, B. Lieunard To cite this version: I. Monteiro, L. Brunetti, T. Le Flour, G. Lamanna, B. Lieunard..

More information

Accurate Conversion of Earth-Fixed Earth-Centered Coordinates to Geodetic Coordinates

Accurate Conversion of Earth-Fixed Earth-Centered Coordinates to Geodetic Coordinates Accurate Conversion of Earth-Fixed Earth-Centered Coordinates to Geodetic Coordinates Karl Osen To cite this version: Karl Osen. Accurate Conversion of Earth-Fixed Earth-Centered Coordinates to Geodetic

More information

Smooth Transition Between Tasks on a Kinematic Control Level: Application to Self Collision Avoidance for Two Kuka LWR Robots

Smooth Transition Between Tasks on a Kinematic Control Level: Application to Self Collision Avoidance for Two Kuka LWR Robots Smooth Transition Between Tasks on a Kinematic Control Level: Application to Self Collision Avoidance for Two Kuka LWR Robots Tadej Petrič and Leon Žlajpah Abstract A common approach for kinematically

More information

Prototype Selection Methods for On-line HWR

Prototype Selection Methods for On-line HWR Prototype Selection Methods for On-line HWR Jakob Sternby To cite this version: Jakob Sternby. Prototype Selection Methods for On-line HWR. Guy Lorette. Tenth International Workshop on Frontiers in Handwriting

More information

Motion-based obstacle detection and tracking for car driving assistance

Motion-based obstacle detection and tracking for car driving assistance Motion-based obstacle detection and tracking for car driving assistance G. Lefaix, E. Marchand, Patrick Bouthemy To cite this version: G. Lefaix, E. Marchand, Patrick Bouthemy. Motion-based obstacle detection

More information

Inverse KKT Motion Optimization: A Newton Method to Efficiently Extract Task Spaces and Cost Parameters from Demonstrations

Inverse KKT Motion Optimization: A Newton Method to Efficiently Extract Task Spaces and Cost Parameters from Demonstrations Inverse KKT Motion Optimization: A Newton Method to Efficiently Extract Task Spaces and Cost Parameters from Demonstrations Peter Englert Machine Learning and Robotics Lab Universität Stuttgart Germany

More information